Aims & Scope
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.
Dr. Véronique Cortier
Loria - CNRS
Inria, University of Lorraine
F54506 Vandoeuvre lès Nancy, France
Dr. Peng Liu
College of Information Sciences and Technology
Pennsylvania State University
330 Westgate, University Park
PA 16802, USA
Prof. Sushil Jajodia
Center for Secure Information Systems
George Mason University
Dr. Jonathan Millen
IMDEA Software Inst.
University of Salerno
University of Florida
Sabrina De Capitani di Vimercati
Univ. degli Studi di Milano
University of Padova
Univ. Ca’ Foscari di Venezia
Univ. College Cork
University of Stuttgart
University of Science and Technology of China
Univ. of Malaga
Roberto Di Pietro
Univ. of Leuven
Università degli Studi di Milano
Max Planck Institute for Security and Privacy
Stony Brook Univ.
University of Delaware
Pennsylvania State University
ACM Computing Reviews
ACM Digital Library
Applied Science & Technology Source
Business Source Complete
Cambridge Scientific Abstracts
Computer Science Index
DBLP Bibliography Server
Emerald Management Reviews
International Security & Counter-Terrorism Reference Center
Microsoft Academic Search
Science & Technology Collection
Ulrich's Periodicals Directory
Web of Science: BIOSIS Previews
Web of Science: Emerging Sources Citation Index
Journal of Computer Security is a peer-reviewed journal. All articles submitted to the journal undergo a single blind peer review process. This means that the identity of the authors is known with the reviewers but the identity of the reviewers is not communicated to the authors.
Each submitted article is pre-screened by the Editors-in-Chief to decide if it is suitable to be sent out for formal review. Reasons to reject a paper in the pre-screening process could for example be because the work does not fall within the aims and scope, the writing is of poor quality, the instructions to authors were not followed or the presented work is not novel.
Papers deemed suitable to be reviewed will be assigned a handling editor. The handling editor will then invite reviewers to comment on the work. Typically, a minimum of two reviews are required to be able make a decision on a paper.
Reviewers are asked to judge a paper on at least:
- Relevance to the journal
- Significance of results
- Depth of results
- Correctness of results
- Clarity of presentation
Based on the received reviews the handling editor will propose to the Editors-in-Chief their recommendation:
- Accept as is
- Accept Pending Minor Revisions
- Revise and Resubmit
- Reject Outright
For articles that receive a Revise and Resubmit decision, often major revisions are required and articles may still be rejected in a second round of peer review.
Accept or reject decisions are made by the Editors-in-Chief, whose decision is final.